Proposed British Digital Information & Smart Data Bill

The new UK government used the recent King’s Speech upon the opening of Parliament to announce a proposal for a new Digital Information and Smart Data Bill (the “Bill”). 
 
The proposed Bill builds on the legacy of the Data Protection and Digital Innovation Bill (“DPDI Bill”) that was discussed extensively in the previous Parliamentary session (but which failed to become law prior to the dissolution of Parliament prior to the July 2024 UK general election) by intending to lay a baseline for a new era of data governance within the UK. 

Background

The Bill follows on the heels of the DPDI Bill, which fell away in the parliamentary wash-up prior to the general election. The DPDI intended to update the UK’s data protection framework, including establishing a statutory regime for Smart Data and Digital ID (being digital identity verification frameworks). The DPDI Bill had received wide-ranging legislative scrutiny prior in the previous parliamentary session and was anticipated to become law. 

Accordingly, the proposed Bill will amend and update the UK’s data protection regime, although many of the concepts that the Bill is likely to cover are taken directly from the defunct DPDI Bill. The key aspects that are to be covered in the Bill are set out below. 

Digital Verification Services

As originally proposed in the DPDI Bill, the Bill will seek to establish digital verification services in the UK, empowering individuals and businesses to embrace secure digital identities. This is intended to create added convenience in everyday life such as assisting with age verification checks, pre-employment checks and moving house, and have broad applicability across a range of sectors. Digital identities are expected to foster economic growth through adding efficiency to common time-consuming processes. 

National Underground Asset Register (NUAR)

The Bill also introduces the NUAR; a digital map intended to revolutionise infrastructure management by providing planners, operators and engineers with instant access to data on the pipes, cables and other network assets functioning underground. This is intended to enable efficient maintenance, repair and operation of such items.  

Smart Data Schemes: Unlocking Insights Across Sectors

Smart Data Schemes will be introduced through the Bill, which enable the secure sharing of customer data through authorised third party providers. This puts forward a wide potential of opportunities, such as seamless financial management across a range of customer accounts. 

Revising The Digital Economy Act 

The Bill will strengthen public services through revisions to the Digital Economy Act, permitting the Government to share data about businesses that use public services. One of the ultimate intentions here is to eventually move to an electronic system for birth and death registrations, thus streamlining and developing efficiencies in this area. 

Strengthening The ICO

Under the Bill, the ICO (the UK’s data protection regulator) will receive enhanced regulatory powers, which will come alongside the clarification of data laws that are currently obstructing the safe development and deployment of new technologies. 

Who Will The Bill Affect?

The key businesses affected by the Bill will be those operating in the digital verification and identity sector, or users of these services (for example organisations in the financial services sector). The developments put forward by the Bill will act as a core foundation for establishing and regulating digital identity verification technologies within the UK.

The Smart Data Schemes proposed by the Bill will act as a legal backbone for data portability programmes, and will particularly be useful for those working in open banking through the enhancement of customer data with contextual ‘business’ data, thus improving decision making in the open banking landscape. 

Key Implications

If enacted in line with the Government’s announced intentions, the Bill will be a pivotal move for the UK’s data protection landscape, particularly in respect of its reforms around Digital Verification Service (the process of confirming an online identity). The King’s Speech indicated that the government estimates these reforms to produce £600 million in economic benefit annually. 

The Bill is intended to nurture and develop the implementation of digital technologies within the UK, thus boosting the UK’s reputation as a global leader in respect of technological development and related legislative provisions. Further developments and insights on the Bill will be revealed in the coming months and potentially-affected businesses should be alive to this evolution.

David Varney is Partner at independent UK law firm Burges Salmon  

Image: 

You Might Also Read: 

Taming Aggressive Algorithms:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Student Who Sold Cyber Attack Software Is Jailed
The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

EVOLEO Technologies

EVOLEO Technologies

EVOLEO provides engineering services covering a wide range of needs in the electronics design, embedded and systems engineering.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

Magna5

Magna5

Magna5 is a managed IT service provider focusing in network and server monitoring, backup and disaster recovery, cybersecurity, help desk and SD-WAN.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

CYBHORUS

CYBHORUS

CYBHORUS are a team of Italian cyber security experts, specialized in cyber threat defense and strategic and organizational consulting.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.